General

  • Target

    3dbbffab27a39a3459cafbe92b70d3c2_JaffaCakes118

  • Size

    984KB

  • Sample

    240514-d4drcahf95

  • MD5

    3dbbffab27a39a3459cafbe92b70d3c2

  • SHA1

    e5395c59cfce1cc1c1a2aeeb02cf0cadf523266f

  • SHA256

    f220c9f845ac40b5b11d8290dc8c9897c4c3b554ec22f8826dbc4f2716e3b8d7

  • SHA512

    9dfc0f806f5fa1698c8dedad8c82641f9dcced7b394b043d790831f6998268a5795746243140ec380d42a85ca8de05eb649d61c93f97849a39fa3a9ba4d60bfd

  • SSDEEP

    12288:Zaq7cK4cX2cKhH0xjoBCExjV2jXjb4MO7oz2e2rEwDpgsipCqbak9W0vQqJ0PN:Z17D4jcKZAkIjXjb4MOsz2eFG2vCkz6

Malware Config

Extracted

Family

azorult

C2

http://bulbukito.ru/index.php

Targets

    • Target

      3dbbffab27a39a3459cafbe92b70d3c2_JaffaCakes118

    • Size

      984KB

    • MD5

      3dbbffab27a39a3459cafbe92b70d3c2

    • SHA1

      e5395c59cfce1cc1c1a2aeeb02cf0cadf523266f

    • SHA256

      f220c9f845ac40b5b11d8290dc8c9897c4c3b554ec22f8826dbc4f2716e3b8d7

    • SHA512

      9dfc0f806f5fa1698c8dedad8c82641f9dcced7b394b043d790831f6998268a5795746243140ec380d42a85ca8de05eb649d61c93f97849a39fa3a9ba4d60bfd

    • SSDEEP

      12288:Zaq7cK4cX2cKhH0xjoBCExjV2jXjb4MO7oz2e2rEwDpgsipCqbak9W0vQqJ0PN:Z17D4jcKZAkIjXjb4MOsz2eFG2vCkz6

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks